Microsoft Security Bulletin Summary for March 2009
Microsoft Security Bulletin Summary for March 2009 Microsoft Security Bulletin Summary for March 2009 Published: March 10, 2009 Note: There may be latency issues due to replication, if the page does not display keep refreshing Note: http://www.
This topic was started by NICK ADSL UK,
Microsoft Security Bulletin Summary for March 2009
Microsoft Security Bulletin Summary for March 2009
Published: March 10, 2009
Note: There may be latency issues due to replication, if the page does not display keep refreshing
Note: http://www.microsoft.com/technet/security and http://www.microsoft.com/security are authoritative in all matters concerning Microsoft Security Bulletins! ANY e-mail, web board or newsgroup posting (including this one) should be verified by visiting these sites for official information. Microsoft never sends security or other updates as attachments. These updates must be downloaded from the microsoft.com download center or Windows Update. See the individual bulletins for details.
Because some malicious messages attempt to masquerade as official Microsoft security notices, it is recommended that you physically type the URLs into your web browser and not click on the hyperlinks provided.
Today Microsoft released the following Security Bulletin(s).
Bulletin Summary:
http://www.microsoft.com/technet/security/...n/ms09-mar.mspx
Critical
Vulnerabilities in Windows Kernel Could Allow Remote Code Execution (958690)
This security update resolves several privately reported vulnerabilities in the Windows kernel. The most serious vulnerability could allow remote code execution if a user viewed a specially crafted EMF or WMF image file from an affected system.
http://www.microsoft.com/technet/security/...n/MS09-006.mspx
Important
Vulnerability in SChannel Could Allow Spoofing (960225)
This security update resolves a privately reported vulnerability in the Secure Channel (SChannel) security package in Windows. The vulnerability could allow spoofing if an attacker gains access to the certificate used by the end user for authentication. Customers are only affected when the public key component of the certificate used for authentication has been obtained by the attacker through other means.
http://www.microsoft.com/technet/security/...n/MS09-007.mspx
Vulnerabilities in DNS and WINS Server Could Allow Spoofing (962238
This security update resolves two privately reported vulnerabilities and two publicly disclosed vulnerabilities in Windows DNS server and Windows WINS server. These vulnerabilities could allow a remote attacker to redirect network traffic intended for systems on the Internet to the attacker´s own systems.
http://www.microsoft.com/technet/security/...n/MS09-008.mspx
Please note that Microsoft may release bulletins out side of this schedule if we determine the need to do so.
If you have any questions regarding the patch or its implementation after reading the above listed bulletin you should contact Product Support Services in the United States at 1-866-PCSafety 1-866-727-2338. International customers should contact their local subsidiary.
As always, download the updates only from the vendors website - visit Windows Update and Office Update or Microsoft Update websites. You may also get the updates thru Automatic Updates functionality in Windows system.
Security Tool
Find out if you are missing important Microsoft product updates by using MBSA.
Microsoft Security Bulletin Summary for March 2009
Published: March 10, 2009
Note: There may be latency issues due to replication, if the page does not display keep refreshing
Note: http://www.microsoft.com/technet/security and http://www.microsoft.com/security are authoritative in all matters concerning Microsoft Security Bulletins! ANY e-mail, web board or newsgroup posting (including this one) should be verified by visiting these sites for official information. Microsoft never sends security or other updates as attachments. These updates must be downloaded from the microsoft.com download center or Windows Update. See the individual bulletins for details.
Because some malicious messages attempt to masquerade as official Microsoft security notices, it is recommended that you physically type the URLs into your web browser and not click on the hyperlinks provided.
Today Microsoft released the following Security Bulletin(s).
Bulletin Summary:
http://www.microsoft.com/technet/security/...n/ms09-mar.mspx
Critical
Vulnerabilities in Windows Kernel Could Allow Remote Code Execution (958690)
This security update resolves several privately reported vulnerabilities in the Windows kernel. The most serious vulnerability could allow remote code execution if a user viewed a specially crafted EMF or WMF image file from an affected system.
http://www.microsoft.com/technet/security/...n/MS09-006.mspx
Important
Vulnerability in SChannel Could Allow Spoofing (960225)
This security update resolves a privately reported vulnerability in the Secure Channel (SChannel) security package in Windows. The vulnerability could allow spoofing if an attacker gains access to the certificate used by the end user for authentication. Customers are only affected when the public key component of the certificate used for authentication has been obtained by the attacker through other means.
http://www.microsoft.com/technet/security/...n/MS09-007.mspx
Vulnerabilities in DNS and WINS Server Could Allow Spoofing (962238
This security update resolves two privately reported vulnerabilities and two publicly disclosed vulnerabilities in Windows DNS server and Windows WINS server. These vulnerabilities could allow a remote attacker to redirect network traffic intended for systems on the Internet to the attacker´s own systems.
http://www.microsoft.com/technet/security/...n/MS09-008.mspx
Please note that Microsoft may release bulletins out side of this schedule if we determine the need to do so.
If you have any questions regarding the patch or its implementation after reading the above listed bulletin you should contact Product Support Services in the United States at 1-866-PCSafety 1-866-727-2338. International customers should contact their local subsidiary.
As always, download the updates only from the vendors website - visit Windows Update and Office Update or Microsoft Update websites. You may also get the updates thru Automatic Updates functionality in Windows system.
Security Tool
Find out if you are missing important Microsoft product updates by using MBSA.
Participate on our website and join the conversation
This topic is archived. New comments cannot be posted and votes cannot be cast.